Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/10/2024, 02:11
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
f2d7f59c276231747caccd70bf574f01
-
SHA1
7a94a716a5726d10e5559fa614e6bb6e87e26aa1
-
SHA256
154f3bb6d0872d339a2625f7a2cf0dc4f96d85aa94d4f76c4c76f3d81a37d19d
-
SHA512
c8d635d95b796c2f480659429e34530e660e7dab67b3f99788508540972294731963129919967a25ba49d664034c341030309a7cb4c7fc00ffd01504e25abc46
-
SSDEEP
49152:/ZGG1LyJ9qP/u0F+F1nqJ3F9j9F7w49WoAVBTHHB72eh2NT:/ZG/Jw20F+F1nqJ3F9T7wn
Malware Config
Extracted
quasar
1.0.0
Office04
Name123forreal-22013.portmap.host:22013
f9634259-eba6-40ac-8644-2c8e433257e9
-
encryption_key
5FD1DA98B24B21C2214C328FD3F0A48F15BBCD2B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Window Defender Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3304-1-0x0000000000190000-0x00000000004B4000-memory.dmp family_quasar behavioral1/files/0x000300000002aabb-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2872 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 332 schtasks.exe 4452 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3304 Client-built.exe Token: SeDebugPrivilege 2872 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2872 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3876 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3304 wrote to memory of 332 3304 Client-built.exe 79 PID 3304 wrote to memory of 332 3304 Client-built.exe 79 PID 3304 wrote to memory of 2872 3304 Client-built.exe 81 PID 3304 wrote to memory of 2872 3304 Client-built.exe 81 PID 2872 wrote to memory of 4452 2872 Client.exe 82 PID 2872 wrote to memory of 4452 2872 Client.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Window Defender Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:332
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Window Defender Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4452
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5a73ea6e1db27acedbe4055c448f82ef7
SHA101769a266d26c4b4b374099606e86b8874ddd55f
SHA256c3059c62596021e555ec7901361fcde75078ad931bcac6027539930bef8b77d9
SHA512f9cfe99077e40ac3ff11ab39020d6e159ec06cf50f9b1d156858198d48851d29de8882a18609a17dd30ddea421c6c415683b8d7b14fa30a51ddd1cd76032deb4
-
Filesize
3.1MB
MD5f2d7f59c276231747caccd70bf574f01
SHA17a94a716a5726d10e5559fa614e6bb6e87e26aa1
SHA256154f3bb6d0872d339a2625f7a2cf0dc4f96d85aa94d4f76c4c76f3d81a37d19d
SHA512c8d635d95b796c2f480659429e34530e660e7dab67b3f99788508540972294731963129919967a25ba49d664034c341030309a7cb4c7fc00ffd01504e25abc46